{"id":350,"date":"2024-12-09T09:13:58","date_gmt":"2024-12-09T09:13:58","guid":{"rendered":"https:\/\/blogs.kent.ac.uk\/cyber-institute-news\/?p=350"},"modified":"2024-12-09T09:23:42","modified_gmt":"2024-12-09T09:23:42","slug":"icss-researcher-interviewed-by-itv","status":"publish","type":"post","link":"https:\/\/blogs.kent.ac.uk\/cyber-institute-news\/2024\/12\/09\/icss-researcher-interviewed-by-itv\/","title":{"rendered":"iCSS researcher interviewed by ITV News Meridian on fake QR codes and Black Friday scams"},"content":{"rendered":"<p><a href=\"https:\/\/www.kent.ac.uk\/computing\/people\/3103\/nurse-jason\">Dr Jason Nurse<\/a>, iCSS\u2019s ECR Engagement Lead and a Reader in Cyber Security at the University of Kent\u2019s School of Computing, was recently interviewed and filmed by <a href=\"https:\/\/www.itv.com\/\">ITV<\/a> at iCSS\u2019s space in Keynes College on the University of Kent\u2019s Canterbury campus. Dr Nurse commented on how fake QR codes being used to scam people in car parks and why they are becoming so prevalent. His interview was made part of a news story of <a href=\"https:\/\/www.itv.com\/news\/meridian\">ITV News Meridian<\/a> and broadcast on 18<sup>th<\/sup> November.<\/p>\n<p>In the news story, Dr Nurse said: \u201c<em>QR code scams are becoming so prevalent. Firstly because QR codes are so popular. They\u2019re used by restaurants, train companies and they&#8217;re also used all across society. So criminals sort of see that, and they immediately think, \u2018hey, we can capitalise on that\u2019 in the context of scams against people who don\u2019t really understand and can\u2019t tell easily whether something is actually fraudulent or not.<\/em>\u201d<\/p>\n<p>Following this story, Dr Nurse was also interviewed for an ITV news segment on Black Friday scams, which aired on the 28<sup>th<\/sup> November. In the interview, he discussed the key scams facing individuals as they look for the latest deals, and most importantly, what members of the public should look out for in order to avoid being scammed.<\/p>\n<p>Dr Nurse\u2019s top tips included, \u201c<em>In looking for the best offers, be careful of what websites you access. Be vigilant and check deals and offers carefully. Avoid rushing into making a decision as it could be a criminal trying to trick you out of your hard-earned cash.<\/em>\u201d<\/p>\n<p>At iCSS, our researchers welcome media and journalists to contact us for expert comments on a wide range of cyber security related topics. If you need help on identifying an iCSS researcher for your queries, please visit our website <a href=\"https:\/\/cyber.kent.ac.uk\/\">cyber.kent.ac.uk<\/a> to find the right researchers or contact us via\u00a0<a href=\"mailto:cyber-info@kent.ac.uk\">cyber-info@kent.ac.uk<\/a> if you need any help.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dr Jason Nurse, iCSS\u2019s ECR Engagement Lead and a Reader in Cyber Security at the University of Kent\u2019s School of Computing, was recently interviewed and &hellip; <a href=\"https:\/\/blogs.kent.ac.uk\/cyber-institute-news\/2024\/12\/09\/icss-researcher-interviewed-by-itv\/\">Read&nbsp;more<\/a><\/p>\n","protected":false},"author":81794,"featured_media":351,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[152367,169120,19122,283106,594,124,283111,159685,283109,283108],"_links":{"self":[{"href":"https:\/\/blogs.kent.ac.uk\/cyber-institute-news\/wp-json\/wp\/v2\/posts\/350"}],"collection":[{"href":"https:\/\/blogs.kent.ac.uk\/cyber-institute-news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.kent.ac.uk\/cyber-institute-news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/cyber-institute-news\/wp-json\/wp\/v2\/users\/81794"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/cyber-institute-news\/wp-json\/wp\/v2\/comments?post=350"}],"version-history":[{"count":3,"href":"https:\/\/blogs.kent.ac.uk\/cyber-institute-news\/wp-json\/wp\/v2\/posts\/350\/revisions"}],"predecessor-version":[{"id":354,"href":"https:\/\/blogs.kent.ac.uk\/cyber-institute-news\/wp-json\/wp\/v2\/posts\/350\/revisions\/354"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/cyber-institute-news\/wp-json\/wp\/v2\/media\/351"}],"wp:attachment":[{"href":"https:\/\/blogs.kent.ac.uk\/cyber-institute-news\/wp-json\/wp\/v2\/media?parent=350"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/cyber-institute-news\/wp-json\/wp\/v2\/categories?post=350"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/cyber-institute-news\/wp-json\/wp\/v2\/tags?post=350"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}